A survey on homomorphic encryption schemes: Theory and implementation A Acar, H Aksu, AS Uluagac, M Conti ACM Computing Surveys (Csur) 51 (4), 1-35, 2018 | 1195 | 2018 |
A survey on security and privacy issues of bitcoin M Conti, ES Kumar, C Lal, S Ruj IEEE communications surveys & tutorials 20 (4), 3416-3452, 2018 | 1180 | 2018 |
Smart health: A context-aware health paradigm within smart cities A Solanas, C Patsakis, M Conti, IS Vlachos, V Ramos, F Falcone, ... IEEE Communications Magazine 52 (8), 74-81, 2014 | 739 | 2014 |
A Survey of Man In The Middle Attacks M Conti, N Dragoni, V Lesyk IEEE Communications Surveys & Tutorials, 2016 | 724 | 2016 |
Android Security: A Survey of Issues, Malware Penetration and Defenses P Faruki, A Bharmal, V Laxmi, V Ganmoor, M Gaur, M Conti, ... IEEE Communications Surveys & Tutorials 17 (2), 2015 | 709 | 2015 |
Internet of Things security and forensics: Challenges and opportunities M Conti, A Dehghantanha, K Franke, S Watson Future Generation Computer Systems 78, 544-546, 2018 | 686 | 2018 |
Poseidon: Mitigating interest flooding DDoS attacks in named data networking A Compagno, M Conti, P Gasti, G Tsudik 38th annual IEEE conference on local computer networks, 630-638, 2013 | 434 | 2013 |
Design of secure user authenticated key management protocol for generic IoT networks M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo IEEE Internet of Things Journal 5 (1), 269-282, 2017 | 399 | 2017 |
Crepe: Context-related policy enforcement for android M Conti, VTN Nguyen, B Crispo Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 382 | 2011 |
Robust smartphone app identification via encrypted network traffic analysis VF Taylor, R Spolaor, M Conti, I Martinovic IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017 | 381 | 2017 |
{FlowFence}: Practical data protection for emerging {IoT} application frameworks E Fernandes, J Paupore, A Rahmati, D Simionato, M Conti, A Prakash 25th USENIX security symposium (USENIX Security 16), 531-548, 2016 | 368 | 2016 |
DDoS attacks in cloud computing: Issues, taxonomy, and future directions G Somani, MS Gaur, D Sanghi, M Conti, R Buyya Computer communications 107, 30-48, 2017 | 367 | 2017 |
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic VF Taylor, R Spolaor, M Conti, I Martinovic 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016 | 352 | 2016 |
Peek-a-boo: I see your smart home activities, even encrypted! A Acar, H Fereidooni, T Abera, AK Sikder, M Miettinen, H Aksu, M Conti, ... Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 344 | 2020 |
Provably secure authenticated key agreement scheme for smart grid V Odelu, AK Das, M Wazid, M Conti IEEE Transactions on Smart Grid 9 (3), 1900-1910, 2016 | 342 | 2016 |
Detecting crypto-ransomware in IoT networks based on energy consumption footprint A Azmoodeh, A Dehghantanha, M Conti, KKR Choo Journal of Ambient Intelligence and Humanized Computing 9, 1141-1152, 2018 | 321 | 2018 |
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007 | 305 | 2007 |
Analyzing android encrypted network traffic to identify user actions M Conti, LV Mancini, R Spolaor, NV Verde IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015 | 298 | 2015 |
FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments PGV Naranjo, Z Pooranian, M Shojafar, M Conti, R Buyya Journal of parallel and distributed computing 132, 274-283, 2019 | 281 | 2019 |
All you need is" love" evading hate speech detection T Gröndahl, L Pajola, M Juuti, M Conti, N Asokan Proceedings of the 11th ACM workshop on artificial intelligence and security …, 2018 | 278 | 2018 |